General

  • Target

    3a1b3746d26413c8668fb533ab612284.bin

  • Size

    415KB

  • Sample

    240517-bqsl8sah83

  • MD5

    c8f0fb616fa223b27b0c357278bc4219

  • SHA1

    8412ee56535209be5543a7bcca812b41b45b45d0

  • SHA256

    b240b2832512dd4f637614b11be2d7dab70752d1b0b64c9bd5af76b6bb13979d

  • SHA512

    b15cc4688b2cc4454c7d5023a845277e90b8364eb19bc5b059b86a3c700eb5558f27c5e95601a8e200a637e5030156762ef113f89006472f0b76bdca7de2f559

  • SSDEEP

    12288:DjQoacQwh7X9aIFb690aJnothg0pxFodrWHv0v9Q8Wf:/OwhNZ690aECubodry0FQ8W

Score
10/10

Malware Config

Targets

    • Target

      0d57ce22e6ce4c0c232e21fbfab3ebde73d0a2f0f210602ece8d066d37e57924.exe

    • Size

      827KB

    • MD5

      3a1b3746d26413c8668fb533ab612284

    • SHA1

      875d159c892558473519f947c0421672717f7e2c

    • SHA256

      0d57ce22e6ce4c0c232e21fbfab3ebde73d0a2f0f210602ece8d066d37e57924

    • SHA512

      26f20ae889e6a327d6cd710082c0a2ccf4e94a6cc90bd8b3916f7b28a00e7f7c23448c7dfc817242b48e80468779b815133db64a7a4b7b77dc8729a940e5a8fe

    • SSDEEP

      12288:DqUgxxQIWHTZu9PBjhP/i4TuI+sqBcDOC6hThC/8bMCHZR:uZQ9HTZu9lN/i4qI+sq6+nNj

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks